Optimization of cyber security through the implementation of AI technologies

Identification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive approaches in mitigating the risk of cyber threats....

Full description

Saved in:
Bibliographic Details
Main Authors: Nawaf Liqaa, Bentotahewa Vibhushinie
Format: Article
Language:English
Published: De Gruyter 2025-02-01
Series:Journal of Intelligent Systems
Subjects:
Online Access:https://doi.org/10.1515/jisys-2024-0226
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823860497812815872
author Nawaf Liqaa
Bentotahewa Vibhushinie
author_facet Nawaf Liqaa
Bentotahewa Vibhushinie
author_sort Nawaf Liqaa
collection DOAJ
description Identification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive approaches in mitigating the risk of cyber threats. Additionally, the aim of this research is to provide beneficial approaches on how to handle cyber threats in detail. For example, threats and attacks may be caused in the absence of legislation, ethical standardization, support system, and lack of access control. The governance system, therefore, will put a lot of effort into communicating, identifying, and enforcing the principles of security to moderate risk. The Metaheuristic algorithms are stimulated by the human brain, so implementing Artificial Intelligence (AI) that assists the Neural Network to mimic the behaviour of the human brain is important to predict significant outcomes. In this study, the author investigates and analyses the rapid growth of cyber threats to outline the solutions. The aim of this study is to contribute to cyber security optimization through implementing AI methodologies.
format Article
id doaj-art-626a7fc19a6e4ebfad2f8c02cb77b4ac
institution Kabale University
issn 2191-026X
language English
publishDate 2025-02-01
publisher De Gruyter
record_format Article
series Journal of Intelligent Systems
spelling doaj-art-626a7fc19a6e4ebfad2f8c02cb77b4ac2025-02-10T13:24:26ZengDe GruyterJournal of Intelligent Systems2191-026X2025-02-013411310210.1515/jisys-2024-0226Optimization of cyber security through the implementation of AI technologiesNawaf Liqaa0Bentotahewa Vibhushinie1Cybersecurity, Information Networks Centre (CINC), Cardiff School of Technologies, Llandaff Campus, Cardiff Metropolitan University, Western Avenue, Cardiff, CF5 2YB, United KingdomCybersecurity, Information Networks Centre (CINC), Cardiff School of Technologies, Llandaff Campus, Cardiff Metropolitan University, Western Avenue, Cardiff, CF5 2YB, United KingdomIdentification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive approaches in mitigating the risk of cyber threats. Additionally, the aim of this research is to provide beneficial approaches on how to handle cyber threats in detail. For example, threats and attacks may be caused in the absence of legislation, ethical standardization, support system, and lack of access control. The governance system, therefore, will put a lot of effort into communicating, identifying, and enforcing the principles of security to moderate risk. The Metaheuristic algorithms are stimulated by the human brain, so implementing Artificial Intelligence (AI) that assists the Neural Network to mimic the behaviour of the human brain is important to predict significant outcomes. In this study, the author investigates and analyses the rapid growth of cyber threats to outline the solutions. The aim of this study is to contribute to cyber security optimization through implementing AI methodologies.https://doi.org/10.1515/jisys-2024-0226optimizationcyberspacecyber threataiiotsecurityprivacygdprcovid-19
spellingShingle Nawaf Liqaa
Bentotahewa Vibhushinie
Optimization of cyber security through the implementation of AI technologies
Journal of Intelligent Systems
optimization
cyberspace
cyber threat
ai
iot
security
privacy
gdpr
covid-19
title Optimization of cyber security through the implementation of AI technologies
title_full Optimization of cyber security through the implementation of AI technologies
title_fullStr Optimization of cyber security through the implementation of AI technologies
title_full_unstemmed Optimization of cyber security through the implementation of AI technologies
title_short Optimization of cyber security through the implementation of AI technologies
title_sort optimization of cyber security through the implementation of ai technologies
topic optimization
cyberspace
cyber threat
ai
iot
security
privacy
gdpr
covid-19
url https://doi.org/10.1515/jisys-2024-0226
work_keys_str_mv AT nawafliqaa optimizationofcybersecuritythroughtheimplementationofaitechnologies
AT bentotahewavibhushinie optimizationofcybersecuritythroughtheimplementationofaitechnologies